Skip to main content

Home/ StJulians_ITGS/ Group items tagged 2.6_military

Rss Feed Group items tagged

Jorge F1

Israeli hacker retaliates to credit card hacking - 2 views

  •  
    An Israeli hacker has published details of hundreds of Saudi credit cards online and is threatening to post more in revenge for acts by Arab hackers.
  • ...1 more comment...
  •  
    One of the main social and ethical issues in this article is surly privacy. Privacy has been a main issue for our society, not only about credit card details, yet also other personal information. As technology is increasing, the less privacy we have as there are more ways in obtaining this information. And in this case, as technology is increasing, hackers are also as there are easier and more ways in order to get the information they want. There are various ways the hacker can get access to these thousands of credit card numbers, here is one step-by-step of one of the ways of how this IT system works: Firstly, the hacker (or hackers) go around lots of banks and put a small video camera pointing to the bank machine keypad. This video camera is well hidden so that people cannot see them. When someone goes to the machine, they put their credit card number and this analogue information converts to digital information and is recorded in the memory in the video camera. After a few hours/days, the hackers remove the video cameras and upload the data in the memory card via a USB cable and save the data on their servers. The hackers then watch the video and record the credit card numbers on a paper/other computer. With this information, they can obtain more personal information such as names, phone numbers, post codes etc with specialized programs. Finally, when they have all the information they have, they post the personal information including the credit card numbers, on the internet. Yet, in order to maintain the hacker anonymous and not being able to be found via the IP address, he uses another proxy server when uploading this information on the internet. There are also other ways to get the credit card information such as: - Intercepting emails containing passwords - Popups infected by viruses - Spyware - Spam - Keyloggers etc. Some possible solutions for this issue is: - When typing your credit card number in the bank machine keypad, hide the keypad coveri
  •  
    Well yes, I agree with Ines. This is to some extent about privacy. However, I doubt that they obtained that much information by use of cameras in banks. I'd find it much more likely if they have obtained the data from a database in the private sector. I do not think privacy is the most important issue here though. By far and large the most important issue in the article - is how cyber warfare could start to affect the conflict in the Middle East. We've seen how valuable the Internet was in the Arab Spring. The cyber warfare is going to be, and to some extent I imagine, is already an essential tool for the different factions in the Middle East. As this was a breach in the private sector, the security there must be improved with f.ex. stronger firewalls.They must improve their security, if not they are sure to lose money because of the reliability issue.
  •  
    I agree with you, Morten. However, I gave one example of how it would be possible to obtain the credit card numbers, where I gave in the end more examples of how it would be possible to do so.
El Mexicano Pastiche

Hackers expose defence and intelligence officials in US and UK - 4 views

  •  
    This article presents intellectual property theft of civil servants. The article raises many ethical issues such as of privacy, anonymity, security etc. The hackers have accessed private information of government officials, (some of them who work in sensitive areas) their details and emails. Some officials fear that their e-mails can be quickly cracked using off the self software. Some companies client's credit card numbers and addresses were also hacked. The hackers, who are an anonymous groups have clearly violated the privacy rights of individuals. Exposing civil servants data can turn out to be of serious problem for the government. New methods should be developed to secure these confidential data.
  • ...2 more comments...
  •  
    Good overview of the issues there Benjon. Intellectual property is not the issue here however so be careful using terminology correctly. You have stated one of the problems can anyone be more specific about that problem and provide a solution?
  •  
    The article depicts how the personal information of various government organisations have been illegally accessed, furthermore these details have been posted on a vast amount of websites and details such as email passwords etc can be easily cracked using off the shelf software. This means that anyone who has seen the exposed data can easily gain further access to credit card details etc. Furthermore, this puts lives at risk for MI6 agents especially as their cover is supposed to maintain secret, if that sort of information gets into the wrong hands the cover of many agents will be blown and their lives will be at risk.
  •  
    There are various different ways in which security could be improved to prevent a similar incident from happening. It is mentioned in the article, and by Benjon that simple of the shelf software would be capable of decrypting the passwrords stored on the Stratfor database. This in my opinion is quite shocking as Stratfor offers its service to government officials all around the world, most likely for a monetary fee, and seem to not care whether or not the information they are MEANT to secure is infact secure. This issues could be easily solved by improving their encryption technology to or close to military grade encryption. It is most likely that the company's reputation has been severely damaged and rightly so.
  •  
    Nice link here explaining basics of military encryption: http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard Also I follow this guy's blog and he always has some interesting stories on security and has done a lot of work in the world of cryptography: http://www.schneier.com/
The Zhan

Device Tracks Blood Flow in the Brain - 2 views

  • A headset ultrasound monitor could make it easier to detect the dangerous aftereffects of brain injuries.
  • The company's monitor consists of a headset that directs an array of ultrasound beams through the head and uses a proprietary algorithm to automatically detect the mid-cerebral artery, one of the major arteries supplying blood to the brain. The device then locks the relevant beam onto the artery and measures its blood flow. A machine attached to the headset gives an index of flow and peak velocity.
  •  
    "A new ultrasound device could make it easier to detect a potentially life-threatening condition". An excellent example of data-logging applied to a practical real-life situation.
  •  
    The invention of this device will drastically improve the monitoring of brain related injuries and in particular the one mentioned in the article - vasospasm. The fact that nearly 50% of soldiers who sustain blast injuries can potentially develop vasospasm is more than enough reason for there to be plenty of funding towards the development of this device. It says in the article that "the company plans to make a more rugged version of its commercial device for the battle field." If the company manages to actually develop this, the amount of soldier deaths in the battle field will decrease as the soldiers will be able to get treatment sooner. Within this development the company could have the data be live streamed to the doctors so that they can analyze the data to see if there is any problem. The data can then be stored so that the patient's development can be recorded. As the device is measuring the blood flow in the brain this could also be used to analyze the soldiers brain whilst on the field. This could contribute to developments in other studies of the brain like post-traumatic stress.
Mr Brooke

BBC News - War or gaming fun? Spot the difference - 3 views

  •  
    The blurring of reality and the virtual world has come full circle. Just over twenty years ago I can remember watching the first stirrings of the Gulf War, arguably the first television war, and one where the images of missile strikes were commonplace.
Mr Brooke

Stuxnet worm is the 'work of a national government agency' | Technology | guardian.co.uk - 2 views

  •  
    "Stuxnet worm is the 'work of a national government agency' Malware believed to be targeting Iran's Bushehr nuclear power plant may have been created by Israeli hackers"
Mr Brooke

Rise of the robots and the future of war | Technology | The Observer - 1 views

  •  
    Excellent piece on UAVs lots of links and some discussion of ethical issues
Mr Brooke

Robots, the Military's Newest Forces - NYTimes.com - 0 views

  •  
    "FORT BENNING, Ga. - War would be a lot safer, the Army says, if only more of it were fought by robots."
Mr Brooke

Crazy Military Tracking Tech, From Super Scents to Quantum Dots | Danger Room | Wired.com - 0 views

  •  
    One for the workshop?
Fiche Galinha

Wireless system enables UAVs to communicate with operators - 0 views

  • Wireless system enables UAVs to communicate with operators
Mr Brooke

BBC News - How pixels could make tanks invisible - 0 views

  •  
    cloaking devices.....
1 - 19 of 19
Showing 20 items per page